MITS Advanced Research Techniques
Research Proposal
Candidate:
Student Name
Higher Education Department
Proposed Title:
Proposed Title of the Research to be Undertaken
Abstract (250 words one page):
The Abstract goes here. The abstract is a brief summary of the contents of a study, and it allows readers to quickly survey the essential elements of a project. Approximately 150 - 250 words. Abstract should be justified, italicized with small margins than the rest of the document
Introduction(3 pages):
(literature review)(5 pages):
This section provides an opportunity to quickly grab the attention of your reviewer and explain why they should care about the project. Contains a number of important sections. The sections below are recommended, but can be changed to suit different proposals approx 5pages
Methodological Approach(3 pages):
This section outlines the methods you will use in conducting the research and analyzing the data. 3 pages
Conclusion :
Half page to one page
If concept matrix is been added than put it before references
References (15 – 20 references):
5 to 8 references are already provided just add a few more in it
Running head: CYBER SECURITY 1
CYBER SECURITY 2
Topic : Cyber Security
Cyber Security
Abstract
Data integrity, an integral aspect of cyber security, is identified as the consistence and accuracy that is assured of data in its life cycle, and is an imperative aspect of implementation, design, and utilization of systems which processes, stores, and retrieves data (Graham, 2017). It is estimated that almost 90 percent of the world’s data was generated in the last two year, and this goes to show the rate at which data is being availed. There are various threats associated with data integrity, for example, security, human, and transfer errors, cyber-attacks and malware just to name a few. The purpose of examination of data integrity in the context of organizations and business is due to the impact that it has on the latter’s operations and eventual success.
Data integrity is important when it comes to the productivity and operations of an organization, because management make decisions based on real-time data that is offered to them. If the data presented to management is inaccurate due to lack of proper data integrity, then the decisions that they make might have an adverse effect on an organization. For example, if data related to last year’s projections and profits in the finance department is altered in any way, then the decision of making plans in relation to an organization’s financial position might be lead to further losses. Organizations ought to prioritize security measures through there various Information Systems departments or by seeking third party cyber security specialties to protect and mitigate against the threats related to data integrity.
Research Question
What are the threats associated with data integrity and the impact they have on organizational productivity and operati.
Web & Social Media Analytics Previous Year Question Paper.pdf
MITS Advanced Research TechniquesResearch ProposalCandidate.docx
1. MITS Advanced Research Techniques
Research Proposal
Candidate:
Student Name
Higher Education Department
Proposed Title:
Proposed Title of the Research to be Undertaken
Abstract (250 words one page):
The Abstract goes here. The abstract is a brief summary of the
contents of a study, and it allows readers to quickly survey the
essential elements of a project. Approximately 150 - 250 words.
Abstract should be justified, italicized with small margins than
the rest of the document
Introduction(3 pages):
(literature review)(5 pages):
This section provides an opportunity to quickly grab the
attention of your reviewer and explain why they should care
about the project. Contains a number of important sections. The
sections below are recommended, but can be changed to suit
different proposals approx 5pages
Methodological Approach(3 pages):
This section outlines the methods you will use in conducting the
research and analyzing the data. 3 pages
Conclusion :
Half page to one page
If concept matrix is been added than put it before references
References (15 – 20 references):
5 to 8 references are already provided just add a few more in it
2. Running head: CYBER SECURITY 1
CYBER SECURITY 2
Topic : Cyber Security
Cyber Security
Abstract
Data integrity, an integral aspect of cyber security, is identified
as the consistence and accuracy that is assured of data in its life
cycle, and is an imperative aspect of implementation, design,
and utilization of systems which processes, stores, and retrieves
data (Graham, 2017). It is estimated that almost 90 percent of
the world’s data was generated in the last two year, and this
goes to show the rate at which data is being availed. There are
various threats associated with data integrity, for example,
security, human, and transfer errors, cyber-attacks and malware
just to name a few. The purpose of examination of data integrity
in the context of organizations and business is due to the impact
that it has on the latter’s operations and eventual success.
Data integrity is important when it comes to the productivity
and operations of an organization, because management make
decisions based on real-time data that is offered to them. If the
data presented to management is inaccurate due to lack of
proper data integrity, then the decisions that they make might
have an adverse effect on an organization. For example, if data
related to last year’s projections and profits in the finance
department is altered in any way, then the decision of making
3. plans in relation to an organization’s financial position might be
lead to further losses. Organizations ought to prioritize security
measures through there various Information Systems
departments or by seeking third party cyber security specialties
to protect and mitigate against the threats related to data
integrity.
Research Question
What are the threats associated with data integrity and the
impact they have on organizational productivity and operations?
Reference
Graham, Kenneth R. (2017). Data Integrity
Solution
s: Turning Data into Dollars & Sense. Bookbaby.
Article
Human Error
Transfer Error
Cyber Attacks
Compromised Hardware
Malware
Belkacem & Bouhamdi (2018)
X
X
X
4. Nedal & Sail (2013)
X
X
X
X
Morovat (2015)
X
X
X
X
Patel et al. (2015)
X
X
X
Kavale. (2012)
X
X
X
X
5. Rodríguez & American Society for Quality (2019).
X
X
X
X
Kim, & SecTech (2010)
X
X
X
X
Citations of Selected Articles
Article 1
Article 2
Article 3
Article 4
Article 5
6. Belkacem, A., & .Bouhamdi, A. (2018). “Model for decision-
making process with big data,” Journal of Theoretical and
Applied Information Technology, vol. 96, p. 5951 – 596
Nedal, A., & Sail, A., (2013). “Data integrity in cloud
computing security,” Journal of Theoretical and Applied
Information Technology, Vol. 58, no. 3, p. 570.
Morovat, K. (2015). Data Integrity Verification in Cloud
Computing.
Patel, N., Shah, P., & Prajapati, P. (2015). Efficient Data
Recovery with Data Integrity Proetection. Saarbrucken: LAP
LAMBERT Academic Publishing.
Kavale, S. (2012). “The role of data in strategic decision
making process,” International journal of current research, vol.
4, no. 4, p. 01-07.
Rodríguez, P. J., & American Society for Quality,. (2019). Data
integrity and compliance: A primer for medical product
manufacturers.
Kim, T., & SecTech. (2010). Security Technology, Disaster
7. Recovery and Business Continuity: International Conferences,
SecTech and DRBC 2010, Held as Part of the Future Generation
Information Technology Conference, FGIT 2010, Jeju Island,
Korea, December 13-15, 2010. Proceedings.
Reason for choosing this source
This article is a good source due to its availability and good
authors.
This source touches on the main topic and gives an in depth
analysis of data integrity.
This source is simplified and gives proper insight on data
integrity.
This source not only focuses on the causes of loss of data but
also the means of repairing loss.
This source gives the reason for data breaches and the best way
to rid of them.
This article shows the importance of compliance in achieving
data integrity.
This article focuses on security, disaster recovery and business
continuity in terms of breach.
Brief Description of the source.
This source looks at big data and how it can be easily managed.
8. It recognizes the susceptibility of big data to many breaches and
the focal points for cyber-attacks.
This source beliefs that cloud computing is the best way to store
data. It therefore focuses on how cloud computing can be made
safe and secure from breaches.
This source focuses on verification of data integrity in cloud
computing. It looks to find the sources of breaches and how
they get into the system even in secure scenarios.
This source looks to cover all grounds from protection, breach
and recovery. It tackles all the problems and tries to find the
link between all the processes.
This source looks at how strategically handling data and the
potential threats to data integrity can save a company from any
breach.
The source looks at the legal side of breaches. Companies may
have to pay fines if their data integrity is compromised and
should look to compliance to help them.
This article is on the security from the potential sources of
breaches. It also shows how business continuity can be
achieved.
Data Integrity attacks
· Managing big data
· Protection from breaches in big data.
9. · Transfer error
· Cyber Attacks
· Compromised Hardware
· Malware
· Storage of data in cloud
· Human error
· Cyber Attacks
· Compromised hardware
· Malware
· Transfer Error
· Human Error
· Compromised Hardware
· Data Recovery
· Human error
· Cyber Attacks
· Compromised hardware
· Malware
· Malware
· Human Error
· Compromised Hardware
· Data Recovery
· Transfer Error
· Malware
· Compromised Hardware